Watch how the nation’s largest county revolutionizes voting with help from Cherwell.
Join DLT & Red Hat as they walk through the components and benefits of adapting Simple Content Access (SCA) into your administrative process.
Get an overview on what steps security and third-party risk leaders can take to remediate the impact of the intrusive SolarWinds breach, as well as observations and key points from BitSight research about the prevalence of SolarWinds Orion software throughout the global supply chain.
signNow keeps businesses moving forward by automating even the most complex paper processes. It is a legally-binding e-signature solution and features a fully configurable platform for automating document workflows, no coding necessary. This 20 mins webinar highlights key features of signNow for State and Local officials.
Watch Now, to learn more from David Hawkins, Consulting Engineer, BitSight, moderated by Don Maclean, Chief Cyber Security Technologist, DLT about the innovative approach BitSight has in visibility, Engagement and prioritization to addressing cyber risks.
This is a job-critical webinar as the Center for Digital Education spoke with the school district officials about their experience. While the attack on the district, initially resulted in operational disruptions and some data being inaccessible, they were able to remediate the situation and return its systems to normal operations – without interrupting classes.
This webinar talks about how to avoid the type of breach that was dealt with in the first webinar: how K-12 school districts can better protect their students, faculty, staff and systems from cybersecurity threats.
Don Maclean’s final thoughts on Election Security! An overview of the critical elements that we learned about from our election security partners.
DLT brings you the details and insight to prepare your organization for CMMC. As a DLT partner, we offer you the unique opportunity to gain key insights about CMMC from leaders at DLT, Coalfire, and the DoD.
CDWG and CrowdStrike discuss endpoint security for New York K-12 schools. They will discuss legacy vs. next-Gen A/V and how time to value is an important measure when evaluating security solutions.
IT modernization is a top priority for nearly every federal agency. In order to scale with growing IT demands, many agencies are rapidly adopting cloud technologies across their entire enterprises.
Defense Industrial Base (DIB) CSO’s and their teams have a deciding vote at the business table for the first time. Has their organization achieved the DoD Cybersecurity Mature Model Certification (CMMC) level needed to have their DoD proposal be compliant for submittal?
A new webcast, “Security Trends, Challenges, and Best Practices Using the NIST Cybersecurity Framework” features CrowdStrike security experts as they discuss the details of the NIST CSF and explain how the CrowdStrike Falcon platform works with the framework guidelines to improve your organization’s security posture against modern cyberattacks.
Join this On-Demand webinar where CrowdStrike experts discuss "Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce."
NetBrain automation can reduce the time and manpower requirements by upwards of 90%, resulting in huge cost savings both in the initial audit preparation time and in post-audit activities. Watch the webinar to learn how NetBrain automation can help address CMMC requirements.